Key management for content access control in a hierarchy
- 1 February 2007
- journal article
- Published by Elsevier BV in Computer Networks
- Vol. 51 (11), 3197-3219
- https://doi.org/10.1016/j.comnet.2006.12.011
Abstract
No abstract availableKeywords
This publication has 35 references indexed in Scilit:
- Hierarchical key management scheme using polynomial interpolationACM SIGOPS Operating Systems Review, 2005
- Access control in a hierarchy using one-way hash functionsComputers & Security, 2004
- A survey of key management for secure group communicationACM Computing Surveys, 2003
- Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchyComputers & Security, 2003
- Scalable secure one-to-many group communication using dual encryptionComputer Communications, 2000
- Secure group communications using key graphsACM SIGCOMM Computer Communication Review, 1998
- On key agreement and conference key agreementPublished by Springer Science and Business Media LLC ,1997
- Role-based access control modelsComputer, 1996
- Cryptographic implementation of a tree hierarchy for access controlInformation Processing Letters, 1988
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979